Results 21 to 30 of about 6,728,968 (223)

An innovative approach for dynamic key dependent S-Box to enhance security of IoT systems

open access: yesMeasurement: Sensors, 2023
The Internet of Things (IoT) foresees pervasive and connected smart nodes that interact independently while offering varied services. Today, IoT nodes are a treasure house of data and hence security has become a major concern in IoT networks ...
Divya James, TKS Lakshmi Priya
doaj   +1 more source

Throwing Boomerangs into Feistel Structures

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour   +2 more
doaj   +1 more source

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj   +1 more source

On groups generated by ciphers based on Feistel network

open access: yesMatematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography], 2021
Исследуются шифры, построенные по схеме Фейстеля, у которых функции усложнения представляют собой одну или несколько итераций XSL-схемы. Приводятся достаточные условия, при которых итерационные преобразования таких шифров порождают знакопеременную группу.
V. Antipkin, Dmitrii O. Pasko
semanticscholar   +1 more source

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

Best Effort and Practice Activation Codes [PDF]

open access: yes, 2010
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S.   +4 more
core   +4 more sources

Implementation and Evaluation of a Machine Learned Mesoscale Eddy Parameterization Into a Numerical Ocean Circulation Model

open access: yesJournal of Advances in Modeling Earth Systems, Volume 15, Issue 10, October 2023., 2023
Abstract We address the question of how to use a machine learned (ML) parameterization in a general circulation model (GCM), and assess its performance both computationally and physically. We take one particular ML parameterization (Guillaumin & Zanna, 2021, https://doi.org/10.1002/essoar.10506419.1) and evaluate the online performance in a different ...
Cheng Zhang   +5 more
wiley   +1 more source

Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT

open access: yesIET Image Processing, Volume 17, Issue 10, Page 2984-3001, 21 August 2023., 2023
In IoT sensors, which are used to record and send images, secure image transmission is of great importance. Therefore, we need to use encryption, watermarking and compression processes. Here, a new integrated method of lightweight encryption, watermarking and compression for the fast and secure transmission of images is proposed.
Hadi Nazari   +2 more
wiley   +1 more source

Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security

open access: yes, 2021
In the last few years Internet-of-Things (IoT) technology has emerged significantly to serve varied purposes including healthcare, surveillance and control, business communication, civic administration and even varied financial activities.
K. Gurumanapalli, Nagendra Muthuluru
semanticscholar   +1 more source

Differential analysis of the NBC algorithm based on mixed integer linear programming model

open access: yesSECURITY AND PRIVACY, Volume 6, Issue 4, July/August 2023., 2023
Abstract This paper mainly studies mixed integer linear programming (MILP)‐based cryptanalysis on round‐reduced NBC algorithm with generalized Feistel structure. First, each component of the algorithm is equivalently described by linear inequality equations, and the propagation rules of differential characteristics and linear approximation are ...
Lan Zhang, Bin Yu, Liangsheng He
wiley   +1 more source

Home - About - Disclaimer - Privacy